Which of the following should the office implement to r…
A small office has an Internet connection that drops out about two times per week. It often takes until the next day for the vendor to come out and fix the issue.
Which of the following should the office implement to reduce this downtime?
Which of the following should the technician perform to…
A technician has installed an 802.11n network, and most users are able to see speeds of up to 300Mbps. There are a few users who have an 802.1 1n network card but are unable to get speeds higher that 108Mbps.
Which of the following should the technician perform to fix the issue?
which of the following routing concepts?
During a high availability test of a system, a fiber interruption did not re-route traffic. This is an indication of which of the following routing concepts?
Which of the following antenna types will provide the B…
A campus needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs.
Which of the following antenna types will provide the BEST coverage?
This is MOST likely due to:
An offsite backup company involved in an investigation is not recycling outdated tapes.
This is MOST likely due to:
Which of the following should the administrator do to B…
An administrator would like to test out an open source based phone system prior to making an investment in hardware and phones.
Which of the following should the administrator do to BEST test the software?
Which of the following would provide the highest level …
A client is concerned with theft of equipment from the datacenter.
Which of the following would provide the highest level of physical security for the client?
Which of the following should the network administrator…
A company needs to implement stronger authentication, by adding an authentication factor to their wireless system, which currently only supports WPA with pre-shared keys. The backend authentication system supports
EAP and TTLS.
Which of the following should the network administrator implement?
which of the following?
The networking concept of split horizon is designed to prevent which of the following?
Which of the following protocols was used to compromise…
During a business trip a user connects to the hotel’s wireless to send emails to customers. The user notices the next day that emails have been sent from the user’s account without consent.
Which of the following protocols was used to compromise the user’s email password utilizing a network sniffer?